Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsHospitality & Casinos

New Malware Campaign Targeting Hospitality Sector

By Jordyn Alger, Managing Editor
Hotel hallway
runnyrem via Unsplash
January 8, 2026

Securonix researchers warn of a new campaign targeting the hospitality sector, deceiving users into pasting malicious code.

This campaign, tracked as tracked as PHALT#BLYX, is an infection chain with multiple stages, leveraging click-fix social engineering, a false CAPTCHA, and false “blue screen of death,” or BSOD. Malicious actors gain initial access by tricking targets with a false cancellation of a booking.com reservation. 

The booking.com lure contains a link leading to a fraudulent website. The website presents a false CAPTCHA, leading to a false BSOD. “It is a trick for click-fix that executes a PowerShell command to download a proj file,” the research states. “The campaign leverages MSBuild.exe to compile and execute the payload. The final payload is a heavily obfuscated version of DCRat, capable of process hollowing, keylogging, persistent remote access and to drop secondary payloads.”

According to the research, “The attackers utilize booking.com, a theme that has been abused in the past and remains a persistent threat. The phishing emails notably feature room charge details in Euros, suggesting the campaign is actively targeting European organisations. The use of Russian language within the ‘v.project’ MS build file links this activity to Russian threat factors using DCRat.” 

Below, security leaders discuss this new malware campaign. 

Security Leaders Weigh In 

Christopher Jess, Senior R&D Manager at Black Duck:

This PHALT#BLYX activity is a good example of where attackers don’t require a vulnerability for exploitation. By combining a fake booking.com cancellation lure with a bogus CAPTCHA and a panic-inducing BSOD, the campaign uses the click-fix pattern to coax a user into running PowerShell themselves, then leans on built in tools by abusing trusted Windows tooling like MSBuild.exe to compile and run the next stage. That blend of social engineering plus utilizing legitimate binaries is specifically designed to slip past conventional controls that are tuned for clearly malicious executables. 

Organizations should assume this technique will spread. Click-fix has already shown broad adoption across threat actors, lures, and geographies because it’s low cost to retheme and it relies on user execution rather than a single vulnerable product. What looks like a hospitality (booking.com) problem today can become shipping, HR or finance tomorrow with the same playbook.

So, how do we fight back? Security teams need to break the attack chain where they have the most control: people, privileges, and permitted tools. Train everyone not to run commands just because a web page or verification screen says so. Remind everyone to only check reservations or refunds through the real booking portal or by calling a trusted number. Lock things down further by only allowing developer tools (like MSBuild) on systems that need them, cut back on local admin rights, ensure strong logging, and use tooling to block risky scripts and suspicious process chains (like a browser suddenly launching PowerShell and then MSBuild).

Finally, treat RAT deployment as an incident with follow-on risk. These tools usually mean someone’s poking around, stealing credentials, or setting up more attacks. Be ready to look for signs like unexpected Defender settings, persistence via Startup folder entries, anomalous MSBuild activity, or unexpected outbound traffic. Move fast to quarantine infected machines and reset credentials. 

Note that the campaign targeted European hospitality in late December 2025, timing and sector selection that reinforce how attackers know when to strike for maximum impact.

Kern Smith, Senior Vice President of Global Solutions Engineering at Zimperium:

Campaigns such as this highlight how attackers increasingly rely on social engineering and trusted brand impersonation to bypass traditional controls and these tactics don’t stop at desktops. We routinely see the same lures adapted for mobile delivery, where phishing links, fake CAPTCHAs, and malicious redirects are even harder for users to detect. As attackers refine these deception-based techniques, organizations should assume global spread is inevitable and focus on protecting the device itself. Security teams need continuous, on-device threat detection that can identify malicious links, command execution attempts, and post-click behavior in real time, especially on mobile endpoints that sit outside the visibility of legacy email and network defenses.

Attackers are using techniques like click-fix and fake system errors because they exploit human behavior and the gaps created as work increasingly happens on mobile devices. A mobile-first attack strategy allows threat actors to bypass traditional perimeter, email, and network defenses by pushing users to interact directly with malicious content on their phones, where visibility and enforcement are often weaker. By combining trusted brand lures, browser-based deception, and post-click execution, attackers can scale these campaigns globally with a higher success rate and lower risk of detection.

Lionel Litty, Chief Information Security Officer and Chief Security Architect at Menlo Security:

Displaying a fullscreen BSOD is a key part of tricking the user here. Perhaps surprisingly, a website can enter fullscreen mode without requiring a browser permission prompt. The only prerequisite is a user action that demonstrates the user is interacting with the page. In this attack, this is achieved by having the user click “Reload” on the first fake error page. This serves as a stark reminder of the security risks that come with browsers exposing powerful APIs to untrusted web pages.

KEYWORDS: malware social engineering threat intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

The White House

Trump Administration Issues New AI Executive Order

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Rendered heart monitors

Cybersecurity Stagnation in Healthcare: The Hidden Financial Costs

Top Tech Trends for 2026

Sizing Up Top Tech Trends and Priorities for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Lit up globe

    A new malware named “Voldemort” may be a cyber espionage campaign

    See More
  • Keyboard

    New ZuRu Malware Variant Targeting Developers

    See More
  • Mac

    Security leaders discuss new phishing campaign targeting Mac users

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing